| OLD | NEW |
| 1 /* crypto/x509/x509_set.c */ | |
| 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 * All rights reserved. | 2 * All rights reserved. |
| 4 * | 3 * |
| 5 * This package is an SSL implementation written | 4 * This package is an SSL implementation written |
| 6 * by Eric Young (eay@cryptsoft.com). | 5 * by Eric Young (eay@cryptsoft.com). |
| 7 * The implementation was written so as to conform with Netscapes SSL. | 6 * The implementation was written so as to conform with Netscapes SSL. |
| 8 * | 7 * |
| 9 * This library is free for commercial and non-commercial use as long as | 8 * This library is free for commercial and non-commercial use as long as |
| 10 * the following conditions are aheared to. The following conditions | 9 * the following conditions are aheared to. The following conditions |
| 11 * apply to all code found in this distribution, be it the RC4, RSA, | 10 * apply to all code found in this distribution, be it the RC4, RSA, |
| (...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 * SUCH DAMAGE. | 50 * SUCH DAMAGE. |
| 52 * | 51 * |
| 53 * The licence and distribution terms for any publically available version or | 52 * The licence and distribution terms for any publically available version or |
| 54 * derivative of this code cannot be changed. i.e. this code cannot simply be | 53 * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 * copied and put under another distribution licence | 54 * copied and put under another distribution licence |
| 56 * [including the GNU Public Licence.] | 55 * [including the GNU Public Licence.] |
| 57 */ | 56 */ |
| 58 | 57 |
| 59 #include <stdio.h> | 58 #include <limits.h> |
| 60 #include "cryptlib.h" | 59 #include <string.h> |
| 61 #include <openssl/asn1.h> | 60 |
| 62 #include <openssl/objects.h> | |
| 63 #include <openssl/evp.h> | 61 #include <openssl/evp.h> |
| 64 #include <openssl/x509.h> | 62 #include <openssl/err.h> |
| 65 | 63 |
| 66 int X509_set_version(X509 *x, long version) | 64 #include "evp_locl.h" |
| 65 |
| 66 size_t EVP_AEAD_key_length(const EVP_AEAD *aead) |
| 67 { | 67 { |
| 68 » if (x == NULL) return(0); | 68 » return aead->key_len; |
| 69 » if (x->cert_info->version == NULL) | |
| 70 » » { | |
| 71 » » if ((x->cert_info->version=M_ASN1_INTEGER_new()) == NULL) | |
| 72 » » » return(0); | |
| 73 » » } | |
| 74 » return(ASN1_INTEGER_set(x->cert_info->version,version)); | |
| 75 } | 69 } |
| 76 | 70 |
| 77 int X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial) | 71 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) |
| 78 { | 72 { |
| 79 » ASN1_INTEGER *in; | 73 » return aead->nonce_len; |
| 80 | |
| 81 » if (x == NULL) return(0); | |
| 82 » in=x->cert_info->serialNumber; | |
| 83 » if (in != serial) | |
| 84 » » { | |
| 85 » » in=M_ASN1_INTEGER_dup(serial); | |
| 86 » » if (in != NULL) | |
| 87 » » » { | |
| 88 » » » M_ASN1_INTEGER_free(x->cert_info->serialNumber); | |
| 89 » » » x->cert_info->serialNumber=in; | |
| 90 » » » } | |
| 91 » » } | |
| 92 » return(in != NULL); | |
| 93 } | 74 } |
| 94 | 75 |
| 95 int X509_set_issuer_name(X509 *x, X509_NAME *name) | 76 size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead) |
| 96 { | 77 { |
| 97 » if ((x == NULL) || (x->cert_info == NULL)) return(0); | 78 » return aead->overhead; |
| 98 » return(X509_NAME_set(&x->cert_info->issuer,name)); | |
| 99 } | 79 } |
| 100 | 80 |
| 101 int X509_set_subject_name(X509 *x, X509_NAME *name) | 81 size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead) |
| 102 { | 82 { |
| 103 » if ((x == NULL) || (x->cert_info == NULL)) return(0); | 83 » return aead->max_tag_len; |
| 104 » return(X509_NAME_set(&x->cert_info->subject,name)); | |
| 105 } | 84 } |
| 106 | 85 |
| 107 int X509_set_notBefore(X509 *x, const ASN1_TIME *tm) | 86 int EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, |
| 87 » » const unsigned char *key, size_t key_len, |
| 88 » » size_t tag_len, ENGINE *impl) |
| 108 { | 89 { |
| 109 » ASN1_TIME *in; | 90 » ctx->aead = aead; |
| 110 | 91 » if (key_len != aead->key_len) |
| 111 » if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); | |
| 112 » in=x->cert_info->validity->notBefore; | |
| 113 » if (in != tm) | |
| 114 { | 92 { |
| 115 » » in=M_ASN1_TIME_dup(tm); | 93 » » EVPerr(EVP_F_EVP_AEAD_CTX_INIT,EVP_R_UNSUPPORTED_KEY_SIZE); |
| 116 » » if (in != NULL) | 94 » » return 0; |
| 117 » » » { | |
| 118 » » » M_ASN1_TIME_free(x->cert_info->validity->notBefore); | |
| 119 » » » x->cert_info->validity->notBefore=in; | |
| 120 » » » } | |
| 121 } | 95 } |
| 122 » return(in != NULL); | 96 » return aead->init(ctx, key, key_len, tag_len); |
| 123 } | 97 } |
| 124 | 98 |
| 125 int X509_set_notAfter(X509 *x, const ASN1_TIME *tm) | 99 void EVP_AEAD_CTX_cleanup(EVP_AEAD_CTX *ctx) |
| 126 { | 100 { |
| 127 » ASN1_TIME *in; | 101 » if (ctx->aead == NULL) |
| 128 | 102 » » return; |
| 129 » if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); | 103 » ctx->aead->cleanup(ctx); |
| 130 » in=x->cert_info->validity->notAfter; | 104 » ctx->aead = NULL; |
| 131 » if (in != tm) | |
| 132 » » { | |
| 133 » » in=M_ASN1_TIME_dup(tm); | |
| 134 » » if (in != NULL) | |
| 135 » » » { | |
| 136 » » » M_ASN1_TIME_free(x->cert_info->validity->notAfter); | |
| 137 » » » x->cert_info->validity->notAfter=in; | |
| 138 » » » } | |
| 139 » » } | |
| 140 » return(in != NULL); | |
| 141 } | 105 } |
| 142 | 106 |
| 143 int X509_set_pubkey(X509 *x, EVP_PKEY *pkey) | 107 /* check_alias returns 0 if |out| points within the buffer determined by |in| |
| 108 * and |in_len| and 1 otherwise. |
| 109 * |
| 110 * When processing, there's only an issue if |out| points within in[:in_len] |
| 111 * and isn't equal to |in|. If that's the case then writing the output will |
| 112 * stomp input that hasn't been read yet. |
| 113 * |
| 114 * This function checks for that case. */ |
| 115 static int check_alias(const unsigned char *in, size_t in_len, |
| 116 » » const unsigned char *out) |
| 144 { | 117 { |
| 145 » if ((x == NULL) || (x->cert_info == NULL)) return(0); | 118 » if (out <= in) |
| 146 » return(X509_PUBKEY_set(&(x->cert_info->key),pkey)); | 119 » » return 1; |
| 120 » if (in + in_len <= out) |
| 121 » » return 1; |
| 122 » return 0; |
| 147 } | 123 } |
| 148 | 124 |
| 125 ssize_t EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, |
| 126 unsigned char *out, size_t max_out_len, |
| 127 const unsigned char *nonce, size_t nonce_len, |
| 128 const unsigned char *in, size_t in_len, |
| 129 const unsigned char *ad, size_t ad_len) |
| 130 { |
| 131 size_t possible_out_len = in_len + ctx->aead->overhead; |
| 132 ssize_t r; |
| 149 | 133 |
| 134 if (possible_out_len < in_len /* overflow */ || |
| 135 possible_out_len > SSIZE_MAX /* return value cannot be |
| 136 represented */) |
| 137 { |
| 138 EVPerr(EVP_F_AEAD_CTX_SEAL, EVP_R_TOO_LARGE); |
| 139 goto error; |
| 140 } |
| 150 | 141 |
| 142 if (!check_alias(in, in_len, out)) |
| 143 { |
| 144 EVPerr(EVP_F_AEAD_CTX_SEAL, EVP_R_OUTPUT_ALIASES_INPUT); |
| 145 goto error; |
| 146 } |
| 147 |
| 148 r = ctx->aead->seal(ctx, out, max_out_len, nonce, nonce_len, |
| 149 in, in_len, ad, ad_len); |
| 150 if (r >= 0) |
| 151 return r; |
| 152 |
| 153 error: |
| 154 /* In the event of an error, clear the output buffer so that a caller |
| 155 * that doesn't check the return value doesn't send raw data. */ |
| 156 memset(out, 0, max_out_len); |
| 157 return -1; |
| 158 } |
| 159 |
| 160 ssize_t EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, |
| 161 unsigned char *out, size_t max_out_len, |
| 162 const unsigned char *nonce, size_t nonce_len, |
| 163 const unsigned char *in, size_t in_len, |
| 164 const unsigned char *ad, size_t ad_len) |
| 165 { |
| 166 ssize_t r; |
| 167 |
| 168 if (in_len > SSIZE_MAX) |
| 169 { |
| 170 EVPerr(EVP_F_AEAD_CTX_OPEN, EVP_R_TOO_LARGE); |
| 171 goto error; /* may not be able to represent return value. */ |
| 172 } |
| 173 |
| 174 if (!check_alias(in, in_len, out)) |
| 175 { |
| 176 EVPerr(EVP_F_AEAD_CTX_OPEN, EVP_R_OUTPUT_ALIASES_INPUT); |
| 177 goto error; |
| 178 } |
| 179 |
| 180 r = ctx->aead->open(ctx, out, max_out_len, nonce, nonce_len, |
| 181 in, in_len, ad, ad_len); |
| 182 |
| 183 if (r >= 0) |
| 184 return r; |
| 185 |
| 186 error: |
| 187 /* In the event of an error, clear the output buffer so that a caller |
| 188 * that doesn't check the return value doesn't try and process bad |
| 189 * data. */ |
| 190 memset(out, 0, max_out_len); |
| 191 return -1; |
| 192 } |
| OLD | NEW |